Criminal activity normally follows a predictable planning pattern as 90% of victim’s recall noticing suspicious activity prior to the crime. Understanding how criminals choose their targets, plan and deploy can assist bank executives in preventing a kidnapping for ransom or extortion situation before it begins.
The first step is target selection; criminals typically select individuals who are vulnerable and unaware of their surroundings. These victims unknowingly display non-verbal cues and behavioral signals labeling themselves as oblivious to their surroundings. Indicators of a preferred victim include abnormal walking stride (dragging feet), slow walking rate, awkwardness of body movements, posture and even gaze.
Victim Selection Process
Prior to criminals conducting surveillance, they first select a target. Numerous studies and research has been conducted to understand how kidnappers, serial killers, rapists and other criminals select their victims. Besides the...
by Luke Bencie and Leo West
It should come as no surprise that the aspect of the terrorist attack planning cycle in which the terrorist is most easily detected, is that during the pre-operational surveillance of intended targets. This “exposed” phase has been the downfall of many would-be terrorists and is usually credited as a key indicator of potential threats. It has also proven significant in post-attack investigations, where surveillance video has helped piece together the evolution of plots for use in assisting with future mitigation strategies.
However, government officials are often reminded that the investigations of 9/11, the 2005 London Underground bombings, as well as of the 2008 terrorist attacks in Mumbai (just to name a few) all reported instances of “casing” prior to the event. A good example is that of Ramzi Yousef who visited the World Trade Center (WTC) several times prior to his delivering the bomb to the...
By Leo Labaj and Bruce Barnes
As a nation, the United States has become addicted to the steady and dependable delivery of electrical power. Without electricity the world, as we know it, would cease to function (imagine no lights, television, cell phones, computers etc.). The US Power Grid is enormously complex and consists of over 11,000 generation facilities, in excess of 200,000 miles of high voltage transmission lines, and thousands of substations. As such, the energy sector is considered the most critical of critical infrastructure and is arguably the backbone of our modern society, due to critical dependencies and interdependencies with other utility sectors.
With today’s heightened risk of terrorist attacks, threats to the energy sector have been increasing, and it is only a matter of time before a major attack is conducted directly against an electric utility or indirectly against the community it serves. For those malicious...
By Luke Bencie
Chemical facilities are soft targets of attack. According to the Center for Chemical Process Safety (CCPS), every facility must engage and implement a comprehensive physical protection program. The decision to implement a physical protection program at a chemical facility, regardless of the elements employed, is made out of the realization that there is a threat, which must be controlled. The design of a physical protection system must first consider the range of events potentially confronting the site or asset to be protected then consider what the consequences of loss or compromise would be and what it might take to deter and prevent such acts from occurring. Once installed and operational, the system must be constantly reviewed to determine if changing threats impact the system now in place.
What initially follows is an executive overview from the American Institute of Chemical Engineers Guidelines for Analyzing and Managing the Security...
One of the most overused expressions thrown around by wannabe “Wall Street Rambos” is business is war. But sometimes war tactics really can help in business.
Among these tactics is CARVER, a system for assessing and ranking threats and opportunities. Developed during World War II, CARVER (then one letter shorter and known as CARVE) was originally used by analysts to determine where bomber pilots could most effectively drop their munitions on enemy targets. It can be both offensive and defensive, meaning it can be used for identifying your competitors’ weaknesses and for internal auditing. In addition, many security experts consider it the definitive assessment tool for protecting critical assets. In fact, the U.S. Department of Homeland Security has recommended it as a preferred assessment methodology. (One of us, Luke, is so enthusiastic about CARVER that he cowrote a book on it.)
More recently, CARVER has converted a new community of believers in the...
50% Complete
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.